2006
DOI: 10.1145/1151659.1159951
|View full text |Cite
|
Sign up to set email alerts
|

Detecting evasion attacks at high speeds without reassembly

Abstract: Ptacek and Newsham [14] showed how to evade signature detection at Intrusion Prevention Systems (IPS) using TCP and IP Fragmentation. These attacks are implemented in tools like FragRoute, and are institutionalized in IPS product tests. The classic defense is for the IPS to reassemble TCP and IP packets,and to consistently normalize the output stream. Current IPS standards require keeping state for 1 million connections. Both the state and processing requirements of reassembly and normalization are barriers to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
33
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(33 citation statements)
references
References 7 publications
0
33
0
Order By: Relevance
“…See, eg, traffic normalization, 28-30 traffic signatures, 31,32 joint work with the target server, 33 and target system emulator. See, eg, traffic normalization, 28-30 traffic signatures, 31,32 joint work with the target server, 33 and target system emulator.…”
Section: Evasion Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…See, eg, traffic normalization, 28-30 traffic signatures, 31,32 joint work with the target server, 33 and target system emulator. See, eg, traffic normalization, 28-30 traffic signatures, 31,32 joint work with the target server, 33 and target system emulator.…”
Section: Evasion Techniquesmentioning
confidence: 99%
“…We deduct 32 which may have caused reassembly to been overlooked in some products. The results of this study indicate that these may have not been properly implemented in some of the tested IPS.…”
Section: Performance Of Intrusion Preventionmentioning
confidence: 99%
“…Scap shares similar goals with Libnids and Stream5. However, previous works treat TCP stream reassembly as a necessity [50], mostly for the avoidance of evasion attacks against intrusion detection systems [14,19,51]. On the contrary, Scap views transport-layer streams as the fundamental abstraction that is exported to network monitoring applications, and as the right vehicle to implement aggressive optimizations.…”
Section: Tcp Stream Reassemblymentioning
confidence: 99%
“…Although previous work treats TCP stream reassembly as a necessary evil [50], used mostly to avoid evasion attacks against intrusion detection and other monitoring systems, we view streams as the fundamental abstraction that should be exported to network monitoring applications, and as the right vehicle for the monitoring system to implement aggressive optimizations all the way down to the operating system kernel and network interface card.…”
Section: Introductionmentioning
confidence: 99%
“…Caswell and Moore [8] summarized at the time known evasion techniques and introduced some new evasions regarding SMB and MSRPC protocols. Examples of more scientific works to solve the evasion problem include a Sigcomm 2006 paper by Varghese et al [9], and the work by Watson et al [10]. ACM CCS has had many papers in the past on the topic, e.g., Shunting [11].…”
Section: Evasion Research Thus Farmentioning
confidence: 99%